+ All Categories
Home > Documents > Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication...

Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication...

Date post: 26-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
21
Cloud security desiderata and user centric identity management for cloud systems Srinivas Padmanabhuni, Ph.D. Principal Research Scientist Infosys Labs Bangalore, India. [email protected] 14 th May 2011 Cloud Developer Conference, Bangalore.
Transcript
Page 1: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

Cloud security desiderata and user centric

identity management for cloud systems

Srinivas Padmanabhuni, Ph.D.

Principal Research Scientist

Infosys Labs

Bangalore, India.

[email protected]

14th May 2011

Cloud Developer Conference, Bangalore.

Page 2: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

2

Agenda

• Cloud overview and Concerns

• How Cloud is good for Security

• Security Concerns

• Key Issues

• Insecure SOA

– SOA Security Threat Profile

– Solutions for SOA Security

• REST Security

– Key Issues

– Solutions

• User Centric Identity Management for Cloud

– OpenId

• Conclusions

Page 3: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

3

Security is the #1 Issue on Cloud Adopters Mind

3

Page 4: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

4

Cloud need not be bad from a security perspective?

• Security measures are cheaper when implemented on a large

scale.

• Cloud homogeneity makes security auditing/testing simpler

• Clouds enable automated security management (e.g. default

virtual machine images and software updates can be pre-

hardened and updated with the latest patches and security

settings)

• Cloud catalyzes Redundancy / Disaster Recovery

• Managed offering of security as a service enables experts with

deep pockets to invest in security services

4

Page 5: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

5

Are Cloud Security Concerns all new?

• Likewise, SOA is a key enabler for modularization of Software

to be provisioned as a cloud, so the SOA threat profile carries

over

• All Cloud Interfaces to be Web Based, the Web threat Profile

carries over, primarily REST based interfaces

• Clouds’ inherent reliance on external environment for

execution, coupled with elastic nature brings a host of new

problems..

• Before that, let us examine what other paradigms carry

over to cloud..

Page 6: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

6

Evolving Cloud Threat Profile (Source: CSA)

• Insecure Service Oriented Architecture

• REST based

– Unprotected APIs

– Web application attacks

• Hypervisor Attacks

• L1/L2 Attacks (Cache Scraping)

• Trojaned AMI Images

•VMDK / VHD Repurposing

•Key Scraping

•Infrastructure DDoS

• Data leakage

• Poor account provisioning

• Cloud provider insider abuse

• Financial DDoS

• "Click Fraud”

Page 7: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

7

Dealing with Insecure SOA

Page 8: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

8

SOA Threat Profile carries over to Cloud

Page 9: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

9

Solution: Follow SOA Security Standards Stack

Page 10: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

10

Solution: Deploy XML Firewalls With Strict Policy

Framework• Unlike conventional firewalls,

new generation firewalls do not work at packet filtering level

• Capable of SOAP content inspection

• Can detect SOAP level repeated / malicious attacks

• DOS detection

• Good to deploy at the enterprise gateway

• Both in Hardware and Software

• Capable of handling XML security standards

• Now extended to REST message filtering too.

Page 11: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

11

Dealing with REST Security

Page 12: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

12

REST API /Web Security Considerations for Cloud

• REST does not have predefined security methods so

developers define their own due to proprietariness of REST

implementations

• Most APIs handle authentication using a key but lack shared

secret(For a sample analysis check out most of the APIs on

http://www.programmableweb.com )

• Huge Problems due to letting a cloud REST service use HTTP

basic authentication (need at least digest enabled or SSL).

• Cloud APIs highlight need to protect against typical Web

threats like XSS, XML/JSON content manipulation, DoS

attacks, session hijacking attacks etc.

Page 13: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

13

Best Practices for REST Security

• Extend Web Security mechanisms for your REST APIs

• Deploy Access Control Rules to Methods

• Validate Validate Validate QUERYSTRING (No Shortcuts)

• Add a password requirement in addition to API Key (enable a shared

secret)

• Encrypt communications

• Use hash-based message authentication code (HMAC) using SHA-2

or above (Used in S3 and other AWS)

• Check for XML firewalls’ additional capability for JSON and other

REST content filtering

Page 14: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

14

Solution 1: Digest HTTP Authentication

HTTP Authentication can be of two types

–Basic

–Digest

Basic Authentication –

–User name and password sent as plain text

–Can be used in any Servlet Container with JaaS.

–Jguard is widely used for JaaS based authentication

–This is stateless

Digest Authentication –

–MD5 of username and password is passed

–Can be used any Servlet Container

–JaaS authentication and authorization is supported

–Stateless

Page 15: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

15

Deployment Descriptors: Web.xml

<login-config>

<auth-method>BASIC</auth-method>

<realm-name>admin</realm-name>

</login-config>

<security-constraint>

//Specifies which URLs to be protected

</ security-constraint>

Auth Method BASIC, DIGEST, CLIENT_CERT

In Java program @RolesAllowed({“role1Allowd”,”roll2Allowed”})

Page 16: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

16

Solution 2: Identity Management for Cloud

Page 17: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

17

User centric Identity for Cloud

• Non applicability of Application-centric access control, where

each application keeps track of its collection of users and

manages because:

– user space maybe shared across applications that can lead to

data replication

– mapping of users and their privileges a herculean task

– Users need to remember multiple accounts/passwords and

maintain them.

• A preferred model is User centric approach which leaves the

user with the ultimate control of their digital identities.

– The user has a consistent user experience

– every user request to any service provider is bundled with the

user identity and entitlement information

– the application lets user the provider dynamically when

authentication/authorization is needed

Page 18: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

18

A UCID solution: OpenId

•OpenID is a user centric identity system

•It allows you to use an existing account to sign in to multiple

websites, without needing to create new passwords

•Popular with leading Cloud Providers

•With OpenID, you control how much of that information is

shared with the websites you visit.

•Typical Details involve:–Provider URL

–Ex: https://www.google.com/accounts/o8/id

–Call Back URL

–OpenID token

–OpenID attribute

Page 19: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

19

Open ID provider Browser Relying Party

1. Present Open ID

2. Optionally AssociatePerform

Discovery and

determine Open

ID Provider

3. Redirect to Open ID provider

User Login and

prompt for trusted

site if necessary

4. Redirect with Assertion result

5.

Authentication

complete6. Establish Authenticated session

Open ID Authentication Process

Page 20: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

20

Steps Forward And Desiderata

• Industry Leaders both from Security and Cloud Provider

Industry should come forward for

– Standardization (Cloud Security Alliance is a good move)

– API Standardization , Metadata standardization etc.

– Contribute to Knowledge Dissemination (CSA Report on Risks is

a good move)

– Educate Cloud Providers on Secure APIs

– Consumers awareness of REST security needs enhancement

– Expand OpenID, Oauth and standardize them

– Research onto advanced Cloud security issues

– Certification Activities (CSA launched one recently)

– Outreach

Page 21: Cloud security desiderata and user centric identity ... · –Basic –Digest Basic Authentication – –User name and password sent as plain text –Can be used in any Servlet Container

21

Q&A

Thank You

Contact [email protected]


Recommended